Explain the changes to the ip stack, Computer Networking

Assignment Help:

After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation:

C:\>ipconfig

Windows IP Configuration

Ethernet adapter El90x1:

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 169.254.55.187

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. :

He called the IT department for help (he was on hold for 5 minutes). When the IT tech support person got on the phone, Bob's PC had already begun working properly. Bob then obtained the following information from his workstation.

C:\>ipconfig

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 139.100.110.50

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. : 139.100.110.1

a. Explain in detail what occurred.

b. How can Bob account for the first IP stack entries?

c. How would you explain the changes to the IP stack?


Related Discussions:- Explain the changes to the ip stack

Compare delays in packet switching and circuit switching, In this question,...

In this question, you will compare delays in packet switching (i.e. in IP networks), in circuit switching (i.e. in PSTN telephony) and in virtual circuit packet switching (i.e. in

Explain torus interconnection networks, Torus: The mesh network with wrap ...

Torus: The mesh network with wrap around connections is termed as Tours Network. Figure: Torus network

What automatic repeat request, What Automatic Repeat Request (ARQ)? Err...

What Automatic Repeat Request (ARQ)? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in tr

Process communicating - application layer, Process communicating End  ...

Process communicating End   systems  communicate with each  other by the  processes. A process  can be  thought  of a s program  that is  running  within  end systems. Process

Determine how many bits are used for the page number, 1.  A virtual memory ...

1.  A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes.  Each page table entry occupies 4 bytes.   a)  How many bits remain unchanged

State the example of intranet security, State the example of intranet secur...

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

virtual private network - virtual private network vpns, Virtual private ne...

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv

Explain about traditional modems, Q. Explain about Traditional Modems? ...

Q. Explain about Traditional Modems? - Subsequent to modulation by the modem an analog signal reaches the telephone company switching station where it sampled and digitized to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd